To survive today's cyber storm, businesses must embrace intelligence

Join us on November 9 to learn how to successfully innovate and gain efficiencies by improving and scaling citizen developers at the Low-Code/No-Code Summit. Register here.

Cyberattacks in the gaming sector have increased by 260% in the first quarter of this year alone. While such attacks may seem frivolous compared to those that have destroyed infrastructure and crippled hospitals, this increase in cyberattacks should be a wake-up call for all industries and for any business that handles personal data or data. silver. These attacks are increasingly carried out by state-backed Chinese and North Korean hackers, as well as sophisticated civilian malicious actors. This is a strong warning signal that no company, organization or sector is immune to state-sponsored attacks, no matter how minor or strategically irrelevant.

In the eyes of North Korea, subject to severe sanctions, or China, increasingly under economic pressure, these gaming companies are de facto financial companies. This is due to their handling of large sums of money or personal data that can be sold for cash on the Dark Web, making them valuable and convenient targets for those looking to access cash. .

The main lesson of this trend is that all companies, even those without an obvious national or political role, are at risk of state-sponsored attacks. Other organizations, known as hub companies - those that on their own don't offer much value to hackers but provide services to parties with deep pockets or valuable data, thus becoming a gateway - are also increasingly at risk. It is often easier to infiltrate these hub companies to reach more interesting or significant targets, rather than going after the target themselves, who are generally more protected and security savvy.

A shift to intelligence-based security

To survive, CISOs must shift to intelligence-driven operations. For this, we recommend an approach that worked well for the Israeli army, where we served as officers. Following several mistakes and battle failures in the 2006 Lebanon war against Hezbollah, the military has adopted an approach where each operation is backed by specific intelligence, which is also shared with the parties directly involved.

Event

Low-Code/No-Code vertex

Learn how to build, scale, and manage low-code programs in an easy way that creates success for everyone this November 9th. Sign up for your free pass today.

register here

This strategy, when applied to cyberspace, can result in better security as well as better use of resources. Solid, specific information should underpin and guide every action, including software purchases, system upgrades, or incident response operations. After all, attackers invest heavily in intelligence to ensure their actions succeed. The defensive side must do the same, using data and information to determine who can attack and how they might do so.

Assess specific threats and enemies

To achieve this, all organizations that consider themselves secure, resilient, and accountable should employ a professional Cyber ​​Threat Intelligence (CTI) team that takes into consideration the geopolitical landscape and state-level attackers . Businesses need to know who their enemies are at all times - through practices such as actively monitoring if potential attackers discuss the business, it...

To survive today's cyber storm, businesses must embrace intelligence

Join us on November 9 to learn how to successfully innovate and gain efficiencies by improving and scaling citizen developers at the Low-Code/No-Code Summit. Register here.

Cyberattacks in the gaming sector have increased by 260% in the first quarter of this year alone. While such attacks may seem frivolous compared to those that have destroyed infrastructure and crippled hospitals, this increase in cyberattacks should be a wake-up call for all industries and for any business that handles personal data or data. silver. These attacks are increasingly carried out by state-backed Chinese and North Korean hackers, as well as sophisticated civilian malicious actors. This is a strong warning signal that no company, organization or sector is immune to state-sponsored attacks, no matter how minor or strategically irrelevant.

In the eyes of North Korea, subject to severe sanctions, or China, increasingly under economic pressure, these gaming companies are de facto financial companies. This is due to their handling of large sums of money or personal data that can be sold for cash on the Dark Web, making them valuable and convenient targets for those looking to access cash. .

The main lesson of this trend is that all companies, even those without an obvious national or political role, are at risk of state-sponsored attacks. Other organizations, known as hub companies - those that on their own don't offer much value to hackers but provide services to parties with deep pockets or valuable data, thus becoming a gateway - are also increasingly at risk. It is often easier to infiltrate these hub companies to reach more interesting or significant targets, rather than going after the target themselves, who are generally more protected and security savvy.

A shift to intelligence-based security

To survive, CISOs must shift to intelligence-driven operations. For this, we recommend an approach that worked well for the Israeli army, where we served as officers. Following several mistakes and battle failures in the 2006 Lebanon war against Hezbollah, the military has adopted an approach where each operation is backed by specific intelligence, which is also shared with the parties directly involved.

Event

Low-Code/No-Code vertex

Learn how to build, scale, and manage low-code programs in an easy way that creates success for everyone this November 9th. Sign up for your free pass today.

register here

This strategy, when applied to cyberspace, can result in better security as well as better use of resources. Solid, specific information should underpin and guide every action, including software purchases, system upgrades, or incident response operations. After all, attackers invest heavily in intelligence to ensure their actions succeed. The defensive side must do the same, using data and information to determine who can attack and how they might do so.

Assess specific threats and enemies

To achieve this, all organizations that consider themselves secure, resilient, and accountable should employ a professional Cyber ​​Threat Intelligence (CTI) team that takes into consideration the geopolitical landscape and state-level attackers . Businesses need to know who their enemies are at all times - through practices such as actively monitoring if potential attackers discuss the business, it...

What's Your Reaction?

like

dislike

love

funny

angry

sad

wow